Query Details
// This query is too long to be in an Analytics Rule (more than 10.000 characters), so it had to be made a function that can be called by the rule. // You can find the function in the next link, just try to define "query_frequency" and "query_period". // // https://github.com/ep3p/Sentinel_KQL/blob/main/Functions/Analytics-SlowPasswordSpray.kql // SlowPasswordSpray(query_frequency = 1h, query_period = 14d)
This query is designed to detect slow password spray attacks, which are a type of cyber attack where an attacker tries a single password against many accounts before moving on to try another password. This is done slowly over a period of time to avoid detection.
The query is too long to be included directly in an Analytics Rule (as it exceeds 10,000 characters), so it has been created as a function that can be called by the rule. The function is stored on GitHub and can be accessed via the provided link.
The function takes two parameters: "query_frequency" and "query_period".
In simpler terms, this function is a tool that checks every hour to see if there have been any slow password spray attacks in the past two weeks.

Jose Sebastián Canós
Released: September 7, 2023
Tables
Keywords
Operators